Sciweavers

579 search results - page 94 / 116
» Security Enforcement Model for Distributed Usage Control
Sort
View
CCGRID
2002
IEEE
14 years 19 days ago
Towards Trust-Aware Resource Management in Grid Computing Systems
Resource management is a central part of a Grid computing system. In a large-scale wide-area system such as the Grid, security is a prime concern. One approach is to be conservati...
Farag Azzedin, Muthucumaru Maheswaran
ICC
2007
IEEE
144views Communications» more  ICC 2007»
14 years 2 months ago
On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks
— Colluding malicious insider nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts (in-band wormholes) in routing path...
Xu Su, Rajendra V. Boppana
COMPSAC
2005
IEEE
14 years 1 months ago
Situation-Awareness for Adaptive Coordination in Service-Based Systems
Service-based systems have many applications, including collaborative research and development, ebusiness, health care, environmental control, military applications, and homeland ...
Stephen S. Yau, Dazhi Huang, Haishan Gong, Hasan D...
GCC
2003
Springer
14 years 26 days ago
Constructing Secure Web Service Based on XML
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Shaomin Zhang, Baoyi Wang, Lihua Zhou
AGENTS
1997
Springer
13 years 12 months ago
Ant-Like Agents for Load Balancing in Telecommunications Networks
This paper describes a novel method of achieving load balancing in telecommunications networks. A simulated network models a typical distribution of calls between arbitrary nodes;...
Ruud Schoonderwoerd, Owen Holland, Janet Bruten